SONY ROOTKITS SYSTEMS when you put a CD in to play it, a prospect that is both disturbing and scary at the same time.

If you thought the record companies were not evil enough, this should be yet another cold splash of water in your face.

According to Mark Russinovich of Sysinternals, he was testing out his new rootkit scanner when he found one on his machine. A detailed version of the hunt is here, and it is well worth the read.

The parts that worry me are that they are putting uninstallable software that could have serious adverse effects on your system without notice or consent. They are doing this in the name of protecting their content, but for some reason I seem to be the last person on earth who seems to think their tendrils should not extend to places where my rights lie.

This is a very serious thing, if it happens to hose your machine when you try to get rid of it, tough luck. It is undocumented, and can cause problems, as it did to Mark, when you try to free yourself of it, and there is no tech support available that I could find. Oh yeah, it doesn’t go away when you take the CD out either, it is there for the duration.

To make matters worse, to play your songs, you simply drop your legally purchased CD in your legally purchased computer, and you are infected with DRM, no choice in the matter. Imagine if you happen to do something as criminal as taking your legally purchased CD to work, where it conflicts with a piece of software. Who is responsible for the cleanup costs?

With any luck, and I can’t believe I am saying this, an ambulance chasing scumbag lawyer will take this up and sue Sony into the ground for stupidity on this level. There has to be some letter of the law that was violated as arrogantly as purchaser’s rights are.

So, it has finally come down to this, you don’t have a choice about DRM, your rights are removed and there is no recourse. All of this to protect the profit margins of Sony Corp, at your expense. If there was ever a good argument for piracy, to me, this is it. No, better yet people, just say no and don’t buy this crap, it is the higher ground.

Explore More

10 steps you can take to improve your online security

1. Ensure that you login to an official site * Ensure that you login to an official site (eg. http://www.planetcreator.net) 2. Choose passwords that are hard to guess. Avoid using

You’ve Hired a Hacker (Section 4)

Section 4: Stimulus and response 4.1: My hacker did something good, and I want to reward him. Good! Here are some of the things most hackers would like to receive

Cyber attacks are real but is there any foolproof defense yet?

Tulip Systems Inc., the world renowned high bandwidth and broadcast stream hosting service US corporation was under repeated cyber attacks aimed at disrupting web services during the Georgia-Russia standoff few